Network Security Research
-
5 common SD-WAN challenges
Sponsored by: TechTarget ComputerWeekly.comSD-WAN is a feature-rich technology with the ability to consolidate networking, security, reporting and management into one platform. But potential users should be aware of inherent SD-WAN challenges and deployment risk factors. In this infographic, we point out five challenges IT teams are facing when evaluating SD-WAN technologies and vendors.
-
13 steps for enabling secure remote work
Sponsored by: TechTarget ComputerWeekly.comRemote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
Infographic: Top 12 risk management skills
Sponsored by: TechTarget ComputerWeekly.comRisk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.
-
Network security in the post-pandemic era
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.
-
Infographic: 7 steps to secure your home wi-fi network
Sponsored by: TechTarget ComputerWeekly.comWi-Fi security, in particular, has evolved. While the days of war driving and finding home networks open to exploit may be over, home Wi-Fi security could still go sideways in many places. Here are seven recommendations to make sure your home Wi-Fi network is secure.
-
Implementing a Zero-Trust Approach to Network Security
Sponsored by: TechTargetImplementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.
-
A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
Sponsored by: TechTarget ComputerWeekly.comTraditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
-
The CISO's guide to supply chain security
Sponsored by: TechTarget ComputerWeekly.comSupply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
-
The rise of edge computing
Sponsored by: TechTarget ComputerWeekly.comThe growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
-
Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
Sponsored by: Cato NetworksThe COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
-
Making Sense of Zero-Trust Security
Sponsored by: TechTargetAs security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.
-
Ofcom raise over £1.3bn in new 5G spectrum auction
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.
-
Top IT predictions in APAC: 2021
Sponsored by: TechTarget ComputerWeekly.comGoing by the predictions fleshed out by technology suppliers and analysts, the Asia-Pacific region will continue to be a cradle for technology innovation, whether it is 5G services, artificial intelligence (AI), cloud computing or cyber security. In this infographic, we review some of the key IT trends that are likely to shape the industry in 2021.
-
A Computer Weekly Buyers Guide to 5G
Sponsored by: TechTarget ComputerWeekly.comDespite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
-
MicroScope – January 2021: Looking forward to the future
Sponsored by: MicroScopeIn this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success
-
A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
Sponsored by: TechTarget ComputerWeekly.comTraditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
-
SASE & Zero Trust: Your Network Security Guide
Sponsored by: Aruba NetworksLearn about the top 5 benefits of SASE and how it enables zero-trust network access.
-
Ofcom raise over £1.3bn for new 5G spectrum auction
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.
-
A Computer Weekly Buyers Guide to 5G
Sponsored by: TechTarget ComputerWeekly.comDespite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.
-
Why CISOs need advanced network security strategies now
Sponsored by: TechTarget SecurityNetwork security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.
-
Threat detection and response demands proactive stance
Sponsored by: TechTarget SecurityCyberthreat volume, velocity and vectors are surging, taxing already stressed security teams. The time for a new cybersecurity approach is here. Threat detection and response tools are evolving just in time, as are the techniques to combat security alert fatigue.
-
SD-WAN: The Most Critical Design Considerations
Sponsored by: NBNExperts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.
-
Can a zero-trust approach fill the security perimeter void?
Sponsored by: TechTarget SecurityZero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
-
Is the SD-WAN home office here to stay?
Sponsored by: HPE Aruba NetworkingWhile VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.